Title
SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes.
Abstract
The current Android sensor security model either allows only restrictive read access to sensitive sensors (e.g., an app can only read its own touch data) or requires special install-time permissions (e.g., to read microphone, camera, or GPS). Moreover, Android does not allow write access to any of the sensors. Sensing-based security and non-security applications, therefore, crucially rely upon the...
Year
DOI
Venue
2017
10.1109/TIFS.2016.2620278
IEEE Transactions on Information Forensics and Security
Keywords
Field
DocType
Smart phones,Androids,Humanoid robots,Security,Cameras,Linux,Microphones
Permission,Authentication,Android (operating system),Computer security,Computer science,Touchscreen,Exploit,Computer security model,The Internet,Debugging
Journal
Volume
Issue
ISSN
12
4
1556-6013
Citations 
PageRank 
References 
3
0.40
27
Authors
3
Name
Order
Citations
PageRank
Manar Mohamed1495.90
Babins Shrestha2836.83
Nitesh Saxena3120482.45